Skip to main content

6 docs tagged with "penetration-testing"

View all tags

Burp Suite Overview

A practical, hands-on overview of Burp Suite — proxy workflow, core tools (Proxy, Repeater, Intruder, Scanner), extensions, and safe lab exercises for web application testing.

Cybersecurity Tools

Explore essential cybersecurity tools used for network analysis, penetration testing, digital forensics, and defense. Learn how each tool strengthens modern security operations.

Ethical Hacking & Cyber Defense

Learn ethical hacking techniques, the penetration testing lifecycle, common tools, and defensive strategies to harden systems and respond to attacks.

Metasploit Framework

Practical guide to Metasploit, installation, workflow (recon → exploit → post-exploit), common modules, msfconsole and msfvenom usage, and safe lab exercises.

Nikto Scanning

Learn how to use Nikto, an open-source web server scanner, to identify potential vulnerabilities and misconfigurations in web applications safely and effectively.

Penetration Testing Lab

End-to-end guide to running a safe, repeatable penetration testing lab — reconnaissance, vulnerability discovery, exploitation, post-exploitation, pivoting, and reporting. Includes workflows, commands, diagrams, and ethics-first guidance.